首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   46篇
  免费   1篇
各国政治   1篇
工人农民   5篇
世界政治   2篇
法律   26篇
中国政治   2篇
政治理论   9篇
综合类   2篇
  2020年   3篇
  2019年   3篇
  2018年   1篇
  2017年   1篇
  2016年   3篇
  2015年   2篇
  2014年   4篇
  2013年   7篇
  2012年   6篇
  2011年   1篇
  2010年   1篇
  2009年   1篇
  2008年   3篇
  2007年   4篇
  2006年   2篇
  2004年   2篇
  2002年   1篇
  1996年   1篇
  1986年   1篇
排序方式: 共有47条查询结果,搜索用时 0 毫秒
41.
During WWII, 200,000 girls and young women from across Asia were sexually enslaved by Japan—a tragic history unearthed less than 20 years ago and still inadequately addressed by the Japanese government. This paper examines, from an interdisciplinary perspective, the legacy of this “comfort women” history, problematizing its attendant rituals of apology, “political forgiveness,” and reparation. The author analyzes the meaning of apology and forgiveness, and develops a typology of “reparation,“ concluding that what surviving “comfort women” have articulated is a model of “social reparation,” or a holistic goal of mending the past and restoring an international human community.  相似文献   
42.
The European Union's General Data Protection Regulation (GDPR) became applicable in May 2018. Due to the GDPR's extraterritorial scope, which could result in massive fines for U.S. companies, comparative data privacy law is of great current interest. In June 2018, California passed its own Consumer Privacy Act, echoing some of the provisions of the GDPR. Despite the many articles comparing the two schemes of law, little attention has been given to the foundation of these laws, that is, what exactly encompasses the data referred to by these laws? By understanding how the term “personal data” or “personal information” is defined in both jurisdictions, and why these definitions and the treatment of protected data are so different, companies can strategize to take advantage of these developments in the European Union. After explaining the differences in how data is treated in the United States and the European Union by exploring the definitions, regulations, and court cases, we will explore the five legal strategy pathways that companies might pursue with respect to the legal aspects of data transfer and privacy law compliance. While these strategies range from ignoring the law to adopting the European model worldwide, this analysis of legal strategy reveals a means for companies to gain a competitive advantage through their adoption of a worldwide compliance scheme.  相似文献   
43.
The study examines coercive episodes observed between young children, siblings, and their mothers in two samples of families. One sample consisted of aggressive children, the other of nonaggressive children. Aggressive children initiated more coercive chains, especially when the mother and the sibling had been acting neutrally, and engaged in longer chains than normal children. The longest coercive chain occurred when sibling conflict took place in the aggressive group. Findings showed the level of coercive behavior within chains was a function of the initiator of the chain. The initiator had substantially higher levels of negative behavior throughout the chain, compared to the level shown by the recipients of the chains. This held across both samples. Moreover, the initiator was more likely than the recipient to terminate the chain by displaying the last negative response.  相似文献   
44.
ABSTRACT

Acts of cyberterrorism represent potential, significant negative effects to property, infrastructure systems, security, and an overall way of life. These disruptions garner significant attention from government and the public. Managers concerned by threats of cyberterrorism should understand the components that enhance organizational competence so that doubt and fear do not overtake organizational members when faced with such extreme events. Although organizational competence is important in everyday organizational behaviors, the presence of confidence in organizational abilities is especially critical when operating in the midst of the ambiguity and destructive disruptions associated with cyberterrorist threats. We empirically assess three factors associated with competence for organizations facing simulated cyberterror attacks. Our results support the relationship between two of these factors—organizational identification and deference to expertise—with organizational competence. These findings contribute to research concerning the antecedents critical to organizational competence and also add to the growing research on cyberterrorism.  相似文献   
45.
Former South African Prime Minister Jan Smuts’s 1930 European and North American tour included a series of interactions with diasporic African and African American activists and intelligentsia. Among Smuts’s many remarks stands a particular speech he delivered in New York City, when he called Africans “the most patient of all animals, next to the ass.” Naturally, this and other comments touched off a firestorm of controversy surrounding Smuts, his visit, and segregationist South Africa’s laws. Utilizing news coverage, correspondence, and recollections of the trip, this article uses his visit as a lens into both African American relations with Africa and white American foundation work toward the continent and, especially, South Africa. It argues that the 1930 visit represents an early example of black internationalism and solidarity, reflecting a shift from sociocultural connections between Africa and the diaspora to creating political movements on behalf of African people. To contextualize this visit, we assess events surrounding a meeting that the Phelps-Stokes Fund organized for Smuts at Howard University, using this as a lens into the two disparate, yet interlocked, communities.  相似文献   
46.
Lawyers are obliged to act in the interests of their clients, however, it is not clear how lawyers should do this in practice. Should lawyers follow their clients' instructions without deviation, should they actively manage their clients' expectations, or as many studies suggest, do lawyers place their own interests first? This paper examines how lawyers interact with medical malpractice claimants. It reveals that lawyers take a client-aligned approach, where lawyers acknowledge their client's goals, but do not necessarily do what the client says. We argue that this approach is made necessary by legal and organisational constraints which limit the ability of lawyers to produce the types of outcomes that their clients want.  相似文献   
47.
Psychopathic traits are associated with violent, aggressive behaviors and recidivism in adulthood. To increase positive treatment outcomes, it is arguably beneficial to identify and treat psychopathy as early as possible. Furthermore, because research shows that the effectiveness of behavior modification is likely to be affected by the social information-processing patterns of aggressive children, it is important to understand the relationship between conduct-disordered traits and social cognitions. The results of this study showed that callous/unemotional traits in a community-based sample of behavior-disordered youth (57 male, 19 female; 10-19 years of age; 63% African American) significantly predicted values in obtaining a tangible reward and getting into trouble or being punished. However, callous/unemotional traits, impulsivity/conduct problems, and narcissism failed to predict positive expectations regarding receiving a tangible reward, reducing aversive treatment, and demonstration of dominance. Implications for these results are presented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号